[原文]PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.

-
公告与补丁

It may be possible to surpress this information through the Apache configuration. This has not been confirmed. Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

-
受影响的程序版本

Apache Software Foundation Apache 2.0.28 Beta

-
漏洞讨论

Apache is a powerful, widely used web server available for most operating systems, including Linux, Windows and many other Unix like systems. Apache 2 is currently in development, and beta versions have been made available to the public.

A path disclosure vulnerability exists in the default configuration of some beta releases of Apache 2. If PHP is also installed with default values, it is possible to submit a malicious request to the web server such that the full path of the PHP interpreter is disclosed.

A url of the form http://host/file.php/123 will result in an error message, including in part the path of the file php.exe.

-
漏洞利用

This vulnerability can be exploited with a web browser.

-
解决方案

It may be possible to surpress this information through the Apache configuration. This has not been confirmed.

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.